lightos / credmap
The Credential Mapper
☆440Updated 7 years ago
Alternatives and similar repositories for credmap:
Users that are interested in credmap are comparing it to the libraries listed below
- information gathering via dorks☆382Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆343Updated 3 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆489Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆269Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- SpeedPhishing Framework☆444Updated 5 years ago
- network reconnaissance toolkit☆423Updated 6 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆253Updated 4 years ago
- ☆180Updated last year
- wide range mass audit toolkit☆999Updated 6 years ago
- Advanced Hash Manipulation☆176Updated 5 years ago
- Git all your favorite tools in one click☆263Updated 3 years ago
- Auto Scanning to SSL Vulnerability☆631Updated 4 years ago
- The Hacker's ToolBox☆186Updated 7 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆468Updated 8 years ago
- Command-line tool to scan Google search results for vulnerabilities☆520Updated last week
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆408Updated 3 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆224Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- Linux bash script automation for metasploit☆261Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 7 months ago
- ☆269Updated 4 years ago
- Social engineering tool for human hacking☆120Updated 8 years ago
- Terminator metasploit payload generator☆177Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆364Updated 7 years ago